Hiding Information by Context-Based Synonym Substitution

  • Xueling Zheng
  • Liusheng Huang
  • Zhili Chen
  • Zhenshan Yu
  • Wei Yang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5703)

Abstract

Many methods of linguistic steganography have been proposed by using synonym-substitution to preserve the meaning of the text. However, most of these methods replace words simply according to a static synonym set without considering the context. In this paper, we present a novel method that replaces a word by its synonym on condition that its synonym is suitable for the context. A synonym’s candidates are chosen according to context, therefore, in different context the candidates can be different although the word to be replaced is the same. As a result, both of the synonym set and the encoding are dynamic. In our experiment, we use Chinese language to implement our method. The experimental results show that the method is almost twice as good as other two existing methods.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bennett, K.: Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text. Purdue University, CERIAS Tech. Report, 13:2004 (2004)Google Scholar
  2. 2.
    Bolshakov, I.A.: A method of linguistic steganography based on collocationally-verified synonymy. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 180–191. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  3. 3.
    Chapman, M., Davida, G.I., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 156–165. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  4. 4.
    Chiang, Y.L., Chang, L.P., Hsieh, W.T., Chen, W.C.: Natural language watermarking using semantic substitution for chinese text. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 129–140. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  5. 5.
  6. 6.
    Hui, W.: The statistical study of Chinese vocabulary. Date of publication unknown from the online source, http://www.huayuqiao.org/articles/wanghui/wanghui06 (doc. Last checked: 2005-06-20)
  7. 7.
    HIT IR Lab. Chilin-Thesaurus of Chinese WordsGoogle Scholar
  8. 8.
    Low, S.H., Maxemchuk, N.F., Brassil, J.T., O’Gorman, L.: Document marking and identification using both line and wordshifting. In: IEEE INFOCOM 1995. Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Bringing Information to People. Proceedings, pp. 853–860 (1995)Google Scholar
  9. 9.
    Miller, G.A.: WordNet: a lexical database for English. Communications of the ACM 38(11), 39–41 (1995)CrossRefGoogle Scholar
  10. 10.
    Topkara, M., Taskiran, C.M., Delp III, E.J., et al.: Natural language watermarking. In: Proc. SPIE, vol. 5681, pp. 441–452 (2005)Google Scholar
  11. 11.
    Wayner, P.: Disappearing cryptography: information hiding: steganography & watermarking. Morgan Kaufmann, San Francisco (2002)Google Scholar
  12. 12.
    Winstein, K.: Lexical steganography through adaptive modulation of the word choice hashGoogle Scholar
  13. 13.
    Yuling, L., Xingming, S., Can, G., Hong, W.: An Efficient Linguistic Steganography for Chinese Text. In: 2007 IEEE International Conference on Multimedia and Expo, pp. 2094–2097 (2007)Google Scholar
  14. 14.
    Zhang, H.P., Yu, H.K., Xiong, D.Y., Liu, Q.: HHMM-based Chinese lexical analyzer ICTCLAS. In: Proceedings of Second SIGHAN Workshop on Chinese Language Processing, pp. 184–187 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Xueling Zheng
    • 1
  • Liusheng Huang
    • 1
  • Zhili Chen
    • 1
  • Zhenshan Yu
    • 1
  • Wei Yang
    • 1
  1. 1.University of Science and Technology of ChinaHefeiChina

Personalised recommendations